1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frez [133]
2 years ago
10

Ed wants to make sure that his system is designed in a manner that allows tracing actions to an individual. Which phase of acces

s control is Ed concerned about
Computers and Technology
1 answer:
tatiyna2 years ago
7 0

The phase of access control that one can say that Ed is more concerned about is called Accountability.

<h3>What is accountability?</h3>

Accountability is known to be one that removes the time and effort you that is used on distracting activities and a lot of unproductive behavior and it makes one to be more focused.

Hence, The phase of access control that one can say that Ed is more concerned about is called Accountability.

Learn more about Accountability from

brainly.com/question/27958508

#SPJ1

You might be interested in
He ____ content of a web page contains information used by search engines to help users find your website.
luda_lava [24]
The header content of a web-page can contain meta tags that classify the page. Search engines use this information.
6 0
4 years ago
Code Example 8-1
damaskus [11]

Answer:

Option A: FileNotFoundError

Explanation:

FileNotFoundError is an exception which is thrown when a program fail to open a specified file. The root causes of this type of error can be:

  1. The directory path to locate a target file is wrongly defined in our code due to a typo on the file name or misuse of relative directory path, such as ../ and ./ which denote two different paths.
  2. For some reasons, a target file is misplaced in a wrong directory.

Any one of the above reasons can lead to the exception to be thrown when the file doesn't exist.

6 0
3 years ago
List the different generation of computers with its main component​
Dennis_Churaev [7]

Answer:

1940 – 1956:  First Generation

1956 – 1963: Second Generation

1964 – 1971: Third Generation

1972 – 2010: Fourth Generation

2010-  : (Present )Fifth Generation

Explanation:

  1. First Generation Computers (1940-1956):In this Generation the main component of computers were Vacuum Tubes.
  2. Second Generation Computers (1956-1963):In this generation the main component of computers were Transistors.
  3. Third Generation Computers (1964-1971):In this generation the main component of computers were Integrated Circuits.
  4. Fourth Generation Computers (1972-2010):In this generation the main component of computers were Microprocessor
  5. Fifth Generation (2010-Present):In this generation the main component of computers is Artificial Intelligence
4 0
3 years ago
How does social network use message to entertain?
Marizza181 [45]

Answer:

Explanation:

Social Network allows for easy creation of large groups of people that have the same tastes or are looking for the same thing. This allows for easy ways to entertain by providing what these individuals are looking for. Whether it is funny pictures, animal videos, news, celebrity videos, etc. Basically this ability to group individuals together by taste is what allows social networks to entertain through mass messaging in a way that is effective and gets the media in front of huge audiences.

3 0
3 years ago
In this section of your final project, you will write a basic script to create and back up files. You will create this script wi
Viktor [21]

Answer:

bjdjdindbdubduf kndjnxjxjfujdjbdjbd bzjbd djbdibdu jdjdidnidndi xubdubdufjksk. xud ufbsjjdi djneibdudbdujfjfbjbdj fu. fjfjjdubdjjdbjd jdbdinkdkdnd. djjdibnfjdkndindundi jdudjbdubd djbdu bdudjdjjd djidndud dudbid anís us dj

4 0
3 years ago
Read 2 more answers
Other questions:
  • What button is marked with the little hollow square at the top of the right window
    7·2 answers
  • What New England industry quickly collapsed with the discovery of oil in Pennsylvania?
    11·2 answers
  • Identify characteristics of top-down programming design. Choose all that apply.
    13·1 answer
  • Which of the following is an object-oriented prototype-based language? Java Pike REBOL MATLAB
    9·1 answer
  • AI in processing capability of computer yes or no​
    13·2 answers
  • VLSI is the process of creating an integrated circuit (IC) by combing thousands of transistors into a single chip. There are two
    11·1 answer
  • ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
    14·1 answer
  • Within how many days can a deleted view be restored?
    6·1 answer
  • In your own view, how can social media be used in teaching and learning in higher education?
    10·1 answer
  • Void printInfo()
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!